Behavioral task
behavioral1
Sample
c57a6a5c32862ed654e7d018925725d968dca1f4f7c08b2b7b4ba7a5e5e84973.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c57a6a5c32862ed654e7d018925725d968dca1f4f7c08b2b7b4ba7a5e5e84973.exe
Resource
win10v2004-20220812-en
General
-
Target
c57a6a5c32862ed654e7d018925725d968dca1f4f7c08b2b7b4ba7a5e5e84973
-
Size
122KB
-
MD5
5622f71e90973d5d8efcba5291da5d27
-
SHA1
a990d130600bd9c6e1485badc44b9f1f838ce50d
-
SHA256
c57a6a5c32862ed654e7d018925725d968dca1f4f7c08b2b7b4ba7a5e5e84973
-
SHA512
d3da610c05958841b0bf997d5d538f76304a912a06a306f82c35d1f0b12f3044fc0d9954d43a6192e5707c82efd2c405f2907557d28c583f880f8538039c7d81
-
SSDEEP
3072:irR/0MRTKwHzQzi4OBOdW2l4GyUA896r7k8KI3WfDQ4j:UR/NRmixBOdW2NyUJe7kTkGQ
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
c57a6a5c32862ed654e7d018925725d968dca1f4f7c08b2b7b4ba7a5e5e84973.exe windows x86
473324e98ef235265a8cd773074dcf74
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
TraceMessage
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
RegisterTraceGuidsW
UnregisterTraceGuids
CreateProcessAsUserW
LookupAccountSidW
GetTokenInformation
OpenProcessToken
kernel32
CloseHandle
GetOverlappedResult
WaitForSingleObjectEx
ReadFile
ResetEvent
GetLastError
CreateEventW
WriteFile
SetNamedPipeHandleState
Sleep
CreateFileW
GetSystemWindowsDirectoryW
GetCurrentProcess
HeapSetInformation
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
UnhandledExceptionFilter
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
InterlockedCompareExchange
InterlockedExchange
msvcrt
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
wprintf
_exit
memset
__setusermatherr
_amsg_exit
_initterm
exit
_XcptFilter
_cexit
__wgetmainargs
memcpy
ntdll
RtlFreeHeap
RtlAllocateHeap
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 858B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.UPX0 Size: 108KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE